What is Linux? Linux is an operating system, like Microsoft Windows, MacOS, or Unix. It was created as a hobby by Linus Torvalds, a student at the University of Helsinki in Finland. What most people don’t know about Linux is […] ↓ Read the rest of this entry…
Archive for October, 2012
(Oct 26) IT was discovered that RTFM, the FAQ manager for Request Tracker, allows authenticated users to create articles in any class. For the stable distribution (squeeze), this problem has been fixed in [More…]
(Oct 26) Several vulnerabilities were discovered in Request Tracker, an issue tracking system. CVE-2012-4730 [More…]
(Oct 26) Several security issues were fixed in OpenJDK.
(Oct 26) Several security issues were fixed in Firefox.
(Oct 26) Updated firefox packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical [More…]
The following bug has been fixed:
[-] Unable to install microupdates from scheduler task
The following bug has been fixed:
[-] Invalid master DNS server record with IP address of Plesk server migrate from Plesk version less than 10.2
[-] Messages “Timeout occurred during mysql query” and “MySQL server has gone away” from MySQL server are marked as critical migration errors.
[-] Simultaneously update the configuration of domains leads to errors in the generation of configuration files of webserver
[-] Using nginx breaks getting the static content on domain’s webmail virtual host if default domain for IP address is enabled
(Oct 23) cups-pk-helper, a PolicyKit helper to configure cups with fine-grained privileges, wraps CUPS function calls in an insecure way. This could lead to uploading sensitive data to a cups resource, or overwriting specific files with the content of a cups resource. The user would have [More…]
(Oct 23) Several vulnerabilities were found in ViewVC, a web interface for CVS and Subversion repositories. CVE-2009-5024: remote attackers can bypass the cvsdb row_limit [More…]
(Oct 26) It was discovered that Exim, a mail transport agent, is not properly handling the decoding of DNS records for DKIM. Specifically, crafted records can yield to a heap-based buffer overflow. An attacker can exploit this flaw to execute arbitrary code. [More…]
(Oct 25) Multiple security vulnerabilities were fixed in WebKit.
(Oct 26) Exim could be made to run programs if it received specially crafted networktraffic.
(Oct 23) gpernot discovered that Tinyproxy, a HTTP proxy, is vulnerable to a denial of service by remote attackers by sending crafted request headers. [More…]
(Oct 23) Multiple vulnerabilities have been discovered in Iceweasel, Debian’s version of the Mozilla Firefox web browser. The Common Vulnerabilities and Exposures project identifies the following problems: [More…]
(Oct 23) Several security issues were fixed in Python 3.2.
(Oct 24) Several security issues were fixed in Python 3.1.
Monitor phishing within your top-level domains While some registries still perceive phishing as a content issue for hosting companies and registrars, detailed knowledge of phishing activity within their Top Level Domain(s) is very beneficial for registries. It is a key data source for identifying problematic, negligent, or fraud-friendly registrars, and an essential tool for maintaining the […]
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
(Oct 22) Several security issues were fixed in Ruby.
(Oct 22) Ruby could allow excessive access in untrusted programs.
To provide a comprehensive view of the web hosting industry, Netcraft has researched all of the hosting locations with at least twenty web facing computers found by our Web Server Survey. Of these eleven thousand hosting locations, around seven thousand provide hosting and connectivity services, the remaining being enterprises, government or educational institutions. Netcraft has noted […]